[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 38.852735] audit: type=1800 audit(1545320155.913:25): pid=6082 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 38.871837] audit: type=1800 audit(1545320155.913:26): pid=6082 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 38.891158] audit: type=1800 audit(1545320155.913:27): pid=6082 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.95' (ECDSA) to the list of known hosts. 2018/12/20 15:36:09 fuzzer started 2018/12/20 15:36:14 dialing manager at 10.128.0.26:46613 2018/12/20 15:36:14 syscalls: 1 2018/12/20 15:36:14 code coverage: enabled 2018/12/20 15:36:14 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/20 15:36:14 setuid sandbox: enabled 2018/12/20 15:36:14 namespace sandbox: enabled 2018/12/20 15:36:14 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/20 15:36:14 fault injection: enabled 2018/12/20 15:36:14 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/20 15:36:14 net packet injection: enabled 2018/12/20 15:36:14 net device setup: enabled 15:36:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents64(r1, &(0x7f0000001380)=""/4096, 0x3b9) getdents64(r1, &(0x7f00000001c0)=""/192, 0xc0) fcntl$notify(r1, 0x402, 0x200000000000031) exit(0x0) getdents64(r1, 0x0, 0x0) syzkaller login: [ 95.570703] IPVS: ftp: loaded support on port[0] = 21 [ 96.099184] ip (6263) used greatest stack depth: 53672 bytes left [ 96.699840] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.706440] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.714436] device bridge_slave_0 entered promiscuous mode [ 96.782978] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.789470] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.797307] device bridge_slave_1 entered promiscuous mode [ 96.866812] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 96.934032] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 97.137974] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 97.208249] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 97.538441] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 97.546565] team0: Port device team_slave_0 added [ 97.614192] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 97.622347] team0: Port device team_slave_1 added [ 97.689783] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 97.760534] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 97.831175] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 97.838916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 97.847946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 97.919490] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 97.927175] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 97.936105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 15:36:55 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, 0xffffffffffffffff) [ 98.824912] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.831497] bridge0: port 2(bridge_slave_1) entered forwarding state [ 98.839098] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.845641] bridge0: port 1(bridge_slave_0) entered forwarding state [ 98.854391] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 98.915267] IPVS: ftp: loaded support on port[0] = 21 [ 99.392439] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 100.915240] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.921937] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.929831] device bridge_slave_0 entered promiscuous mode [ 101.057206] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.063758] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.071639] device bridge_slave_1 entered promiscuous mode [ 101.207889] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 101.376074] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 101.716509] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 101.868402] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 101.995012] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 102.003445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 102.413653] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 102.421844] team0: Port device team_slave_0 added [ 102.540301] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 102.548633] team0: Port device team_slave_1 added 15:36:59 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 102.674747] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 102.681862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 102.690372] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 102.844922] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 102.851991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 102.860629] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 103.035755] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 103.043348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 103.052334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 103.132448] IPVS: ftp: loaded support on port[0] = 21 [ 103.256957] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 103.264925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 103.273722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 103.719740] 8021q: adding VLAN 0 to HW filter on device bond0 [ 104.179213] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 104.608350] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 104.614784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 104.622591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 104.843029] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.849552] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.856635] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.863160] bridge0: port 1(bridge_slave_0) entered forwarding state [ 104.871576] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 105.079175] 8021q: adding VLAN 0 to HW filter on device team0 [ 105.495289] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.501896] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.509530] device bridge_slave_0 entered promiscuous mode [ 105.667401] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.674029] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.682003] device bridge_slave_1 entered promiscuous mode [ 105.689100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 105.850971] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 105.960271] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 106.379529] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 106.572952] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 106.747299] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 106.754505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 107.175098] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 107.183335] team0: Port device team_slave_0 added [ 107.300164] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 107.308364] team0: Port device team_slave_1 added [ 107.439565] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 107.582594] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 107.683715] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 107.691378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.700307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 107.862951] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 107.870541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.879388] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 15:37:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents64(r1, &(0x7f0000001380)=""/4096, 0x3b9) getdents64(r1, &(0x7f00000001c0)=""/192, 0xc0) fcntl$notify(r1, 0x402, 0x200000000000031) exit(0x0) getdents64(r1, 0x0, 0x0) [ 109.221853] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.228371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.235443] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.241983] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.250551] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 109.257120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 15:37:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents64(r1, &(0x7f0000001380)=""/4096, 0x3b9) getdents64(r1, &(0x7f00000001c0)=""/192, 0xc0) fcntl$notify(r1, 0x402, 0x200000000000031) exit(0x0) getdents64(r1, 0x0, 0x0) [ 110.102983] IPVS: ftp: loaded support on port[0] = 21 [ 110.195227] 8021q: adding VLAN 0 to HW filter on device bond0 15:37:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents64(r1, &(0x7f0000001380)=""/4096, 0x3b9) getdents64(r1, &(0x7f00000001c0)=""/192, 0xc0) fcntl$notify(r1, 0x402, 0x200000000000031) exit(0x0) getdents64(r1, 0x0, 0x0) [ 110.756315] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 15:37:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents64(r1, &(0x7f0000001380)=""/4096, 0x3b9) getdents64(r1, &(0x7f00000001c0)=""/192, 0xc0) fcntl$notify(r1, 0x402, 0x200000000000031) exit(0x0) getdents64(r1, 0x0, 0x0) [ 111.328724] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 111.335199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.342821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.987675] 8021q: adding VLAN 0 to HW filter on device team0 15:37:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents64(r1, &(0x7f0000001380)=""/4096, 0x3b9) getdents64(r1, &(0x7f00000001c0)=""/192, 0xc0) fcntl$notify(r1, 0x402, 0x200000000000031) exit(0x0) getdents64(r1, 0x0, 0x0) [ 112.653465] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.659982] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.668011] device bridge_slave_0 entered promiscuous mode [ 112.902447] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.908952] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.916864] device bridge_slave_1 entered promiscuous mode [ 113.116380] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 15:37:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents64(r1, &(0x7f0000001380)=""/4096, 0x3b9) getdents64(r1, &(0x7f00000001c0)=""/192, 0xc0) fcntl$notify(r1, 0x402, 0x200000000000031) exit(0x0) getdents64(r1, 0x0, 0x0) [ 113.235950] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 113.639496] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 113.807754] bond0: Enslaving bond_slave_1 as an active interface with an up link 15:37:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents64(r1, &(0x7f0000001380)=""/4096, 0x3b9) getdents64(r1, &(0x7f00000001c0)=""/192, 0xc0) fcntl$notify(r1, 0x402, 0x200000000000031) exit(0x0) getdents64(r1, 0x0, 0x0) [ 114.588347] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 114.596610] team0: Port device team_slave_0 added [ 114.785682] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 114.793984] team0: Port device team_slave_1 added [ 114.974314] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 114.986345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 114.994937] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 15:37:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents64(r1, &(0x7f0000001380)=""/4096, 0x3b9) getdents64(r1, &(0x7f00000001c0)=""/192, 0xc0) fcntl$notify(r1, 0x402, 0x200000000000031) exit(0x0) getdents64(r1, 0x0, 0x0) [ 115.180163] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 115.344989] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 115.352692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 115.361372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 115.438638] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 115.446302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 115.454973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 115.683301] 8021q: adding VLAN 0 to HW filter on device bond0 15:37:12 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, 0xffffffffffffffff) 15:37:13 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, 0xffffffffffffffff) 15:37:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents64(r1, &(0x7f0000001380)=""/4096, 0x3b9) getdents64(r1, &(0x7f00000001c0)=""/192, 0xc0) fcntl$notify(r1, 0x402, 0x200000000000031) exit(0x0) getdents64(r1, 0x0, 0x0) [ 116.329120] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 116.697625] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 116.704085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 116.711710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 117.064728] 8021q: adding VLAN 0 to HW filter on device team0 [ 117.231091] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.237771] bridge0: port 2(bridge_slave_1) entered forwarding state [ 117.244831] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.251292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 117.259968] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 117.717943] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 15:37:17 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) 15:37:17 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xcd, &(0x7f0000000000), 0x3c) [ 120.520105] IPVS: ftp: loaded support on port[0] = 21 [ 121.450891] 8021q: adding VLAN 0 to HW filter on device bond0 [ 121.639762] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.646346] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.653917] device bridge_slave_0 entered promiscuous mode [ 121.727900] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 121.734491] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.740961] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.749094] device bridge_slave_1 entered promiscuous mode [ 121.817119] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 121.884641] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 121.986213] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 121.994916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 122.003039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.092892] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 122.165262] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 122.269264] 8021q: adding VLAN 0 to HW filter on device team0 [ 122.498119] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 122.506403] team0: Port device team_slave_0 added [ 122.576111] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 122.583878] team0: Port device team_slave_1 added [ 122.657613] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 122.732306] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 122.806578] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 122.814174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.823031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 122.898719] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 122.906323] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.915114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 123.692367] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.698908] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.705988] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.712554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.721156] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 124.321981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 15:37:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents64(r1, &(0x7f0000001380)=""/4096, 0x3b9) getdents64(r1, &(0x7f00000001c0)=""/192, 0xc0) fcntl$notify(r1, 0x402, 0x200000000000031) exit(0x0) getdents64(r1, 0x0, 0x0) 15:37:21 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, 0xffffffffffffffff) 15:37:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents64(r1, &(0x7f0000001380)=""/4096, 0x3b9) getdents64(r1, &(0x7f00000001c0)=""/192, 0xc0) fcntl$notify(r1, 0x402, 0x200000000000031) exit(0x0) getdents64(r1, 0x0, 0x0) 15:37:21 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) 15:37:21 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) 15:37:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x8, 0x4, &(0x7f00000000c0)=@framed={{}, [@ldst={0x3, 0x0, 0x6}]}, &(0x7f0000000140)='syzkaller\x00', 0x7f, 0xe0, &(0x7f0000000180)=""/224}, 0x48) 15:37:21 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) 15:37:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x8, 0x4, &(0x7f00000000c0)=@framed={{}, [@ldst={0x3, 0x0, 0x6}]}, &(0x7f0000000140)='syzkaller\x00', 0x7f, 0xe0, &(0x7f0000000180)=""/224}, 0x48) 15:37:22 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") close(r0) 15:37:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x8, 0x4, &(0x7f00000000c0)=@framed={{}, [@ldst={0x3, 0x0, 0x6}]}, &(0x7f0000000140)='syzkaller\x00', 0x7f, 0xe0, &(0x7f0000000180)=""/224}, 0x48) 15:37:22 executing program 2: socketpair$unix(0x1, 0x20002000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x30}, {0x6}]}, 0x10) [ 125.419178] IPVS: ftp: loaded support on port[0] = 21 [ 126.596452] 8021q: adding VLAN 0 to HW filter on device bond0 [ 126.648509] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.655159] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.663112] device bridge_slave_0 entered promiscuous mode [ 126.733055] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.739509] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.747153] device bridge_slave_1 entered promiscuous mode [ 126.816088] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 126.883098] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 126.896835] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 127.085801] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 127.159151] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 127.167622] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 127.179819] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 127.187610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 127.416554] 8021q: adding VLAN 0 to HW filter on device team0 [ 127.514763] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 127.522985] team0: Port device team_slave_0 added [ 127.591202] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 127.599275] team0: Port device team_slave_1 added [ 127.672230] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 127.747012] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 127.820532] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 127.828290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 127.837792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 127.911432] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 127.919028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 127.927862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 128.700326] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.706912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.713956] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.720467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.729441] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 15:37:26 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xcd, &(0x7f0000000000), 0x3c) 15:37:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x8, 0x4, &(0x7f00000000c0)=@framed={{}, [@ldst={0x3, 0x0, 0x6}]}, &(0x7f0000000140)='syzkaller\x00', 0x7f, 0xe0, &(0x7f0000000180)=""/224}, 0x48) 15:37:26 executing program 2: socketpair$unix(0x1, 0x20002000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x30}, {0x6}]}, 0x10) 15:37:26 executing program 0: socketpair$unix(0x1, 0x20002000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x30}, {0x6}]}, 0x10) 15:37:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents64(r1, &(0x7f0000001380)=""/4096, 0x3b9) getdents64(r1, &(0x7f00000001c0)=""/192, 0xc0) fcntl$notify(r1, 0x402, 0x200000000000031) exit(0x0) getdents64(r1, 0x0, 0x0) [ 129.332634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 130.719676] 8021q: adding VLAN 0 to HW filter on device bond0 [ 130.863718] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 131.002520] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 131.008828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 131.016514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.155852] 8021q: adding VLAN 0 to HW filter on device team0 15:37:29 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) 15:37:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_MAP={0x24, 0xe, {0x0, 0x101, 0xfffffffffffffffd, 0x2, 0x600, 0x5}}, @IFLA_IF_NETNSID={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4005}, 0x4004080) 15:37:29 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xcd, &(0x7f0000000000), 0x3c) 15:37:29 executing program 0: socketpair$unix(0x1, 0x20002000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x30}, {0x6}]}, 0x10) 15:37:29 executing program 2: socketpair$unix(0x1, 0x20002000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x30}, {0x6}]}, 0x10) 15:37:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x0, 0x6, 0x0, "3a818d13b89d62d34c1dd02b10d51bf3bcaa8064dc17bb5e667dd235e762982453c57fb0e5cfa4c5ea1f1901a57afc7a1b0705fcc64c451e500ddf6b3064eadbfb9d62d5ca79119c8ca1947651eb1d49"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6, 0x0, 0x1, 0x0, "48acb65b2f70871f84e0dbbd4420a2efef9fcc5bd6877c5ec9cce79e0e92cc95e7cd9f5a7da14c011710c650fe73ed6c0abc59340ced046cb4ed83dd826899c59d0ab710f0be3e6629a5b33d24e115fc"}, 0xd8) sendto$inet6(r0, &(0x7f0000000440), 0xfeef, 0x20000007, &(0x7f0000000040)={0xa, 0x2}, 0x1c) [ 132.189336] ================================================================== [ 132.196793] BUG: KMSAN: uninit-value in __siphash_aligned+0x512/0xae0 [ 132.203390] CPU: 0 PID: 7908 Comm: syz-executor3 Not tainted 4.20.0-rc7+ #8 [ 132.210492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.219839] Call Trace: [ 132.222442] dump_stack+0x173/0x1d0 [ 132.226075] kmsan_report+0x120/0x290 [ 132.229892] kmsan_internal_check_memory+0x9a7/0xa20 [ 132.235024] __msan_instrument_asm_load+0x8a/0x90 [ 132.239866] __siphash_aligned+0x512/0xae0 [ 132.244112] secure_ipv6_port_ephemeral+0x110/0x220 [ 132.249131] inet6_hash_connect+0x11f/0x1a0 [ 132.253459] tcp_v6_connect+0x20ba/0x2890 [ 132.257628] ? __msan_poison_alloca+0x1e0/0x270 [ 132.262301] ? tcp_v6_pre_connect+0x130/0x130 [ 132.266794] __inet_stream_connect+0x2f9/0x1340 [ 132.271462] ? kmem_cache_alloc_trace+0x55a/0xb90 [ 132.276304] ? tcp_sendmsg_locked+0x6394/0x6be0 [ 132.280977] tcp_sendmsg_locked+0x65d5/0x6be0 [ 132.285484] ? aa_label_sk_perm+0xda/0x940 [ 132.289717] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 132.295074] ? aa_label_sk_perm+0x6d6/0x940 [ 132.299392] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 132.304761] ? futex_wait+0x912/0xc40 [ 132.308583] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 132.313956] tcp_sendmsg+0xb2/0x100 [ 132.317581] ? tcp_sendmsg_locked+0x6be0/0x6be0 [ 132.322249] inet_sendmsg+0x54a/0x720 [ 132.326050] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 132.331407] ? security_socket_sendmsg+0x1bd/0x200 [ 132.336360] ? inet_getname+0x490/0x490 [ 132.340333] __sys_sendto+0x8c4/0xac0 [ 132.344166] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 132.349633] ? prepare_exit_to_usermode+0x114/0x420 [ 132.354659] ? syscall_return_slowpath+0x50/0x650 [ 132.359501] __se_sys_sendto+0x107/0x130 [ 132.363567] __x64_sys_sendto+0x6e/0x90 [ 132.367558] do_syscall_64+0xbc/0xf0 [ 132.371282] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 132.376481] RIP: 0033:0x457669 [ 132.379680] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 132.398584] RSP: 002b:00007f1a583d3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 132.406291] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457669 [ 132.413555] RDX: 000000000000feef RSI: 0000000020000440 RDI: 0000000000000003 [ 132.420820] RBP: 000000000072bf00 R08: 0000000020000040 R09: 000000000000001c [ 132.428105] R10: 0000000020000007 R11: 0000000000000246 R12: 00007f1a583d46d4 [ 132.435369] R13: 00000000004c4539 R14: 00000000004d75a8 R15: 00000000ffffffff [ 132.442644] [ 132.444263] Local variable description: ----combined@secure_ipv6_port_ephemeral [ 132.451693] Variable was created at: [ 132.455427] secure_ipv6_port_ephemeral+0x6a/0x220 [ 132.460354] inet6_hash_connect+0x11f/0x1a0 [ 132.464660] [ 132.466297] Bytes 2-7 of 8 are uninitialized [ 132.470699] Memory access of size 8 starts at ffff88814e44f5f0 [ 132.476659] ================================================================== [ 132.484006] Disabling lock debugging due to kernel taint [ 132.489457] Kernel panic - not syncing: panic_on_warn set ... [ 132.495339] CPU: 0 PID: 7908 Comm: syz-executor3 Tainted: G B 4.20.0-rc7+ #8 [ 132.504186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.513543] Call Trace: [ 132.516128] dump_stack+0x173/0x1d0 [ 132.519755] panic+0x3ce/0x961 [ 132.522965] kmsan_report+0x285/0x290 [ 132.526779] kmsan_internal_check_memory+0x9a7/0xa20 [ 132.531907] __msan_instrument_asm_load+0x8a/0x90 [ 132.536787] __siphash_aligned+0x512/0xae0 [ 132.541043] secure_ipv6_port_ephemeral+0x110/0x220 [ 132.546153] inet6_hash_connect+0x11f/0x1a0 [ 132.550482] tcp_v6_connect+0x20ba/0x2890 [ 132.554640] ? __msan_poison_alloca+0x1e0/0x270 [ 132.559312] ? tcp_v6_pre_connect+0x130/0x130 [ 132.563802] __inet_stream_connect+0x2f9/0x1340 [ 132.568468] ? kmem_cache_alloc_trace+0x55a/0xb90 [ 132.573308] ? tcp_sendmsg_locked+0x6394/0x6be0 [ 132.577982] tcp_sendmsg_locked+0x65d5/0x6be0 [ 132.582489] ? aa_label_sk_perm+0xda/0x940 [ 132.586830] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 132.592188] ? aa_label_sk_perm+0x6d6/0x940 [ 132.596506] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 132.601863] ? futex_wait+0x912/0xc40 [ 132.605688] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 132.611058] tcp_sendmsg+0xb2/0x100 [ 132.614687] ? tcp_sendmsg_locked+0x6be0/0x6be0 [ 132.619366] inet_sendmsg+0x54a/0x720 [ 132.623181] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 132.628539] ? security_socket_sendmsg+0x1bd/0x200 [ 132.633484] ? inet_getname+0x490/0x490 [ 132.637452] __sys_sendto+0x8c4/0xac0 [ 132.641268] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 132.646731] ? prepare_exit_to_usermode+0x114/0x420 [ 132.651762] ? syscall_return_slowpath+0x50/0x650 [ 132.656725] __se_sys_sendto+0x107/0x130 [ 132.660787] __x64_sys_sendto+0x6e/0x90 [ 132.664755] do_syscall_64+0xbc/0xf0 [ 132.668466] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 132.673653] RIP: 0033:0x457669 [ 132.676857] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 132.695769] RSP: 002b:00007f1a583d3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 132.703470] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457669 [ 132.711360] RDX: 000000000000feef RSI: 0000000020000440 RDI: 0000000000000003 [ 132.718645] RBP: 000000000072bf00 R08: 0000000020000040 R09: 000000000000001c [ 132.725907] R10: 0000000020000007 R11: 0000000000000246 R12: 00007f1a583d46d4 [ 132.733173] R13: 00000000004c4539 R14: 00000000004d75a8 R15: 00000000ffffffff [ 132.741665] Kernel Offset: disabled [ 132.745381] Rebooting in 86400 seconds..